Method and system for collecting information from computer...

Electrical computers and digital processing systems: multicomput – Remote data accessing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S201000, C709S205000, C709S212000, C709S216000, C709S236000, C709S237000, C709S245000, C709S246000, C709S251000

Reexamination Certificate

active

07962571

ABSTRACT:
A method and system for retrieving data from devices in a way that seeks to preserve privacy and ensure the integrity of the retrieved data is provided. A retrieval system is implemented on a network of devices that communicate with each other via a secure communications link. Each device is directly connected to one or more “friend” devices that it trusts. The retrieval system operates by forwarding a request for data from one friend device to another friend device. Each friend device may optionally add data to the request until all the requested data is added. The request with the retrieved data is returned to the device that initiated the request.

REFERENCES:
patent: 5511191 (1996-04-01), de Leeuw van Weenen et al.
patent: 5719942 (1998-02-01), Aldred et al.
patent: 5819042 (1998-10-01), Hansen
patent: 5822743 (1998-10-01), Gupta et al.
patent: 5867714 (1999-02-01), Todd et al.
patent: 5996075 (1999-11-01), Matena
patent: 6026163 (2000-02-01), Micali
patent: 6047332 (2000-04-01), Viswanathan et al.
patent: 6084877 (2000-07-01), Egbert et al.
patent: 6108800 (2000-08-01), Asawa
patent: 6192472 (2001-02-01), Garay et al.
patent: 6324581 (2001-11-01), Xu et al.
patent: 6473659 (2002-10-01), Shah et al.
patent: 6480605 (2002-11-01), Uchiyama et al.
patent: 6658602 (2003-12-01), Nakano
patent: 6671811 (2003-12-01), Diep et al.
patent: 6691249 (2004-02-01), Barford et al.
patent: 6704752 (2004-03-01), Kathail et al.
patent: 6738811 (2004-05-01), Liang
patent: 6754699 (2004-06-01), Swildens et al.
patent: 6763482 (2004-07-01), Bernklau-halvor
patent: 6768721 (2004-07-01), Schmitz et al.
patent: 6839769 (2005-01-01), Needham et al.
patent: 6862696 (2005-03-01), Voas et al.
patent: 6880107 (2005-04-01), Kraft, IV
patent: 6885748 (2005-04-01), Wang
patent: 6970943 (2005-11-01), Subramanian et al.
patent: 6990602 (2006-01-01), Skinner et al.
patent: 7002993 (2006-02-01), Mohaban et al.
patent: 7010617 (2006-03-01), Kampe et al.
patent: 7051102 (2006-05-01), Gupta et al.
patent: 7058861 (2006-06-01), Adams
patent: 7069473 (2006-06-01), Yasuda
patent: 7100084 (2006-08-01), Unkle et al.
patent: 7103874 (2006-09-01), McCollum et al.
patent: 7117312 (2006-10-01), Cypher
patent: 7120933 (2006-10-01), Mattsson
patent: 7134008 (2006-11-01), Dutt et al.
patent: 7191290 (2007-03-01), Ackaouy et al.
patent: 7203729 (2007-04-01), Chen et al.
patent: 7209932 (2007-04-01), Dewey
patent: 7225343 (2007-05-01), Honig et al.
patent: 7320035 (2008-01-01), Kumar et al.
patent: 7325185 (2008-01-01), Szor
patent: 7366768 (2008-04-01), Deo et al.
patent: 7383355 (2008-06-01), Berkman et al.
patent: 7386839 (2008-06-01), Golender et al.
patent: 7392295 (2008-06-01), Yuan et al.
patent: 7430598 (2008-09-01), Raden et al.
patent: 7454457 (2008-11-01), Lowery et al.
patent: 7487543 (2009-02-01), Arnold et al.
patent: 7492789 (2009-02-01), Shvodian
patent: 7519733 (2009-04-01), Thubert et al.
patent: 7600003 (2009-10-01), Okmianski et al.
patent: 7743123 (2010-06-01), Wang et al.
patent: 7856100 (2010-12-01), Wang et al.
patent: 2001/0005821 (2001-06-01), Ottosson
patent: 2002/0026345 (2002-02-01), Juels
patent: 2002/0124187 (2002-09-01), Lyle et al.
patent: 2002/0184555 (2002-12-01), Wong et al.
patent: 2003/0014662 (2003-01-01), Gupta et al.
patent: 2003/0050980 (2003-03-01), Dutta et al.
patent: 2003/0204632 (2003-10-01), Willebeek-LeMair et al.
patent: 2003/0225899 (2003-12-01), Murphy
patent: 2003/0237017 (2003-12-01), Jibbe
patent: 2004/0006546 (2004-01-01), Wedlake et al.
patent: 2004/0019878 (2004-01-01), Kotnur et al.
patent: 2004/0093513 (2004-05-01), Cantrell et al.
patent: 2004/0215740 (2004-10-01), Frank et al.
patent: 2004/0260678 (2004-12-01), Verbowski et al.
patent: 2005/0015639 (2005-01-01), Cornelius et al.
patent: 2005/0102370 (2005-05-01), Lin et al.
patent: 2005/0155031 (2005-07-01), Wang et al.
patent: 2005/0182969 (2005-08-01), Ginter et al.
patent: 2005/0188268 (2005-08-01), Verbowski et al.
patent: 2005/0198110 (2005-09-01), Garms et al.
patent: 2006/0036708 (2006-02-01), Yuan et al.
patent: 2006/0117310 (2006-06-01), Daniels et al.
patent: 2006/0174160 (2006-08-01), Kim
patent: 2006/0233152 (2006-10-01), Suda
patent: 2007/0016902 (2007-01-01), Shozaki et al.
patent: 2007/0091808 (2007-04-01), Raftelis
patent: 2007/0116283 (2007-05-01), Tuyls et al.
patent: 2007/0140479 (2007-06-01), Wang et al.
patent: 2007/0143280 (2007-06-01), Wang et al.
patent: 2007/0168508 (2007-07-01), Wang et al.
patent: 2007/0300103 (2007-12-01), Verbowski et al.
patent: 2008/0304657 (2008-12-01), Tuyls et al.
patent: 2372670 (2002-08-01), None
patent: WO-01/65330 (2001-09-01), None
patent: WO-03/009140 (2003-01-01), None
Paxson, Vern, “Bro: A System for Detecting Network Intruders in Real-Time,” Computer Networks, 31 (23-24), Dec. 14, 1999, pp. 1-22.
Tripwire, Inc., http://www.tripwire.com/, Accessed Oct. 31, 2005.
Bashar, Mohd A. et al., “Low-Threat Security Patches and Tools,” Proceedings of International Conference on Software Maintenance, Oct. 1-3, 1997, Bari, Italy, IEEE Computer Society, pp. 306-313, © 1997 by The Institute of Electrical and Electronics Engineers, Inc.
U.S. Appl. No. 11/762,634, Verbowski et al.
Beattie, Steve et al., “Timing the Application of Security Patches for Optimal Uptime,” 2002 Lisa XVI, Nov. 3-8, 2002, Philadelphia, PA, pp. 101-110.
“Byacc—Berkeley YACC,” 1 page, http://dickey.his.com/byacc/byacc.html, [last accessed Jul. 22, 2005].
Chen, Shuo et al., “A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities,” Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN'03), © 2003 IEEE, 10 pages.
Chen, Zesheng et al., “Modeling the Spread of Active Worms,” IEEE INFOCOM 2003, © 2003 IEEE, 11 pages.
Ganger, Gregory R. et al., “Finding and containing enemies within the walls with self-securing network interfaces,” Technical Report CMU-CS-03-109, Carnegie Mellon University, School of Computer Science, Jan. 2003, 24 pages.
Schulzrinne, H. et al., “RTP: A Transport Protocol for Real-Time Applications,” Jan. 1996, Network Working Group, RFC 1889, Standards Track, 75 pages.
Hsieh, Hung-Yun and Raghupathy Sivakumar, “A Transport Layer Approach for Achieving Aggregate Bandwidths on Multi-homed Mobile Hosts,” MOBICOM'02, Sep. 23-26, 2002, Atlanta, Georgia, © 2002 ACM, 12 pages.
Postel, J. and J. Reynolds, “Telnet Protocol Specification,” RFC: 854, May 1983, Network Working Group.
Postel, J. and J. Reynolds, “File Transfer Protocol (FTP),” RFC: 959, Network Working Group, Oct. 1985 pp. 1-69.
Kamara, Seny et al., “Analysis of Vulnerabilities in Internet Firewalls,” Computers & Security, vol. 22, No. 3, Copyright Elsevier 2003, pp. 214-232.
Klensin, J., “Simple Mail Transfer Protocol,” RFC: 2821, Network Working Group, Standards Track, Apr. 2001, © The Internet Society 2001, 70 pages.
Kohler, Eddie et al., “Programming language techniques for modular router configurations,” Technical Report LCS-TR-812, MIT Laboratory for Computer Science, 2000, pp. 1-22.
Microsoft Security Bulletin MS02-039, “Buffer Overruns in SQL Server 2000 Resolution Service Could Enable Code Execution (Q323875),” Microsoft TechnNet, updated Jan. 31, 2003, 6 pages.
“Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise,” Microsoft Security Bulletin MS01-033, Microsoft TechNet, updated Nov. 4, 2003, © 2005 Microsoft Corporation, http://www.microsoft.com/technet/security/bulletin/MS01-033.mspx?pf=true, [last accessed Jul. 21, 2005].
“Buffer Overrun in RPC Interface Could Allow Code Execution,” Microsoft Security Bulletin MS03-026, Microsoft TechNet, revised Sep. 10, 2003, 8 pages, http://www.micrsoft.com/technet/security/bulletin/MS03-026.mspx?pf=true, [last accessed Jul. 21, 2005].
“UrlScan Security Tool,” Microsoft TechNet, 8 pages,

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for collecting information from computer... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for collecting information from computer..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for collecting information from computer... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2668417

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.